I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
☞ It can easily be disabled or overridden by the user.
☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
Software from an untrustworthy source
☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
Software that is plainly illegal or does something illegal
☞ High-priced commercial software such as Photoshop is "cracked" or "free."
☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
Conditional or unsolicited offers from strangers
☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
☞ You win a prize in a contest you never entered.
☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
☞ Anything online that you would expect to pay for is "free."
Unexpected events
☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
Why shouldn't you use commercial AV products?
☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
☞ Most importantly, a false sense of security is dangerous.
8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Similar Messages

  • Need some advice on what kind of printer to purchase???

    Hello!
    I'm a graphic designer in a small town and I'm wanted to break away from working under someone and start my own small business. I want to be able to print my own work and I'm looking for some suggestions on what kind of printer to purchase (something comparable to the xerox 7750?? or if there is something better???) I was looking at Xerox and not sure if that is the way to go. Most of my work will be small: business cards, wedding invites, graduation announcements, etc. I work at a print shop now and we do a TON of that type of work off our Xerox 7750.
    I'd appreciate any advice you have on purchasing the right printer and getting my small business started!
    Thanks

    I also have a Oki C9800hdn postscript and am a solo operator. The Oki also does banners 325x900mm (up to 1200mm long too)on paper and a special weatherproof paper. Standard sizes are up to oversize A3. Remember to order the POSTSCRIPT version of whatever printer you get.
    Consumables are the thing to look at which makes it hard to price cost of prints.
    I used to have a FujiXerox where I paid monthly on a rental agreement - but it was over 5 years which was too long for me. In real terms it worked out about $850 per month including the cost per 'clicks' which I didn't like either. The black toner and maintenance was included for the Xerox, but I still had to pay for the colour toners which were the same price as the Oki colour toners. (Colour approx AUD$480 each and mono approx $170AUD each). Plus the drums for each colour have to be replaced at 30,000 prints. However the Oki colour toners last longer and do more prints. Don't believe the 'number of prints with 5% coverage'. My average coverage is 80% with full colour or mono. Weight of card is up to 250gsm (more than the Xerox did). You can set up profiles so that what you print is very close to any commercial prints you get done for larger runs.

  • What kind of virus protection to use for

    wondering what kind of virus protection would be able to use although that the I'Macs has Melware and also what kind of security system would go good with a time capsule?
    thanks
    Richard Descoteaux Jr.

    Regarding the anti-virus software, see my Mac Malware Guide.
    As for the security system for a Time Capsule, what kind of security system are you referring to? If you want your backups to be encrypted, see:
    http://pondini.org/TM/31.html
    If that's not it, you'll need to be more specific.

  • Hay guy, does any one here know what kind of games can i download/buy for my new macbook pro? and what should i look after before i buy any game?

    Hay guy, does any one here know what kind of games can i download/buy for my new macbook pro? and what should i look after before i buy any game?

    http://www.apple.com/downloads/macosx/games/
     

  • What kind of virus protection should I get for my iMac?

    I tried downloading AVG, which I use for my PC laptop, but it didn't work.

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What kind of virus protection should I be using with OSX 5.8?

    All of this virus talk lately has me nervous.  Can someone with some knowledge let me know what I should be using to protect my computer?  Do the regular software updates take care of this or should I have something else I'm using independent of the updates?

    Well, it may be getting some updates such as iTunes, but you are not getting system software updates like Java updates which is what you need for the Flashback threat.
    Antivirus software for Macs is still overrated.  Something like Flashback is probably evolving as fast as the antivirus updaters can update, and frankly I think most of what you hear is hype.  The more hype the antivirus software writers can make, the more they sell.  Macs are still pretty safe and antivirus software on a Mac is really to protect you from passing something from a PC using friend to another PC using friend, but not for something you could get.  Yes, there is the occasional malware threat, but 95% of protection against that is just being smart.  For the other stuff you can take it on a case-by-case basis.  The Flashback issue is the only thing I have seen in about the last 12 years that has actually made me in any way change how I use my Mac.  I have disabled Java in my browsers.  No biggie. Frankly I don't think I use any sites that require Java.
    If you really feel you need AV, check out the free version of Sophos, or ClamXAV, but agin those are really just stopping you from passing on Windows viruses.
    User tip: Viruses, Trojans, Malware - and other aspects of Internet Security - https://discussions.apple.com/docs/DOC-2435

  • Video blog - need some advice on what to charge

    hi, i have been asked to put together a price proposal for producing a monthly video "magazine" for a major company in austria and could sure use some input from the video producer community on what i should charge for such a thing. i am not new to video and work as a veejay and produce other forms of videos. i am working on my own feature documentary. but this is for someone else, and i don't have much experience pricing such a job.
    i am the creative designer and director, and would
    a) shoot the subject on a DVX100 myself (2-4 hrs on location)
    b) transfer and edit the footage in FCP
    c) add sound fx and possibly music that i have composed
    c) export for the web and deliver a finished 3-5 minute episode once a month.
    can any of you more experienced producers offer me some pricing guides? i figured per episode 1000 for creative direction plus 1000 for the shoot plus edit. is that too low? too high? i just want to get paid what is worthy for such a job. they bought my skills based on what they have seen from my existing work.
    many thx!
    iMac G5, 20, 1.8Ghz, 2GB Ram   Mac OS X (10.4.3)   power user of pro apps

    I VJ and don't use audio engineers or gaffers. If I needed to, I would hire crew in ad hoc, but for most simple productions I get by through pure one-man-band videojournalism. And let's face it, a production for a company intranet/internet site is not the equivalent of filming the next Chanel TVC.
    It's always very difficult working out a freelance price. One method is to work out how many hours or days it would take you. Decide what you would expect to be earning if you did that job as a full-time employee. Calcuate the value of your job at that rate, then double it.
    I work in the Middle East, where rates are different (and probably much lower). Cameramen here charge US$1,000 a day for shooting. Editing varies wildly. VNRs are usually budgeted at no less than US$1,000/minute (including the basics: production, filming, writing, editing - extra for translations, voice overs, animation). Bear in mind these prices are for western expat crews, in this place you can literally knock off a zero and hire regional workers, given there are no unions and no minimum wage laws here.
    For what you are doing, maybe consider at least US$2,000/month, more likely US$3,000 and upwards. I have no clue if these prices are absurdly high or absurdly low in Austria though.

  • My iMac is dying and I need some advice on what is wrong with it

    Since about October my imac has decided to restart itself and sometimes just glitch. This started just before I bought starcraft 2. It ran fine for a good few monthes, however it began to start glitching or restarting itself. It has got to the point where I cannot load any games without it glitching or restarting.  I now have to use my windows laptop which is prone to overheating so I can't win either way...
    I have also begun finding multi coloured strikes running through my safari browser. I took a screen shot so I could show you, below is a link to the picture.
    http://i1091.photobucket.com/albums/i390/mmloraculum/Picture3.png
    My computer setup is as follows:
    OS X 10.5.8
    Processor: 2 GHz Intel Core 2 Duo
    Memory: 2 GB 667 MHz DDR2 SDRAM
    My graphics is:
    Chipset Model:          ATY,RadeonX1600
    Thanks for reading this.

    Try reinstalling Leopard:
    How to Perform an Archive and Install
    An Archive and Install will NOT erase your hard drive, but you must have sufficient free space for a second OS X installation which could be from 3-9 GBs depending upon the version of OS X and selected installation options. The free space requirement is over and above normal free space requirements which should be at least 6-10 GBs. Read all the linked references carefully before proceeding.
    1. Be sure to use Disk Utility first to repair the disk before performing the Archive and Install.
    Repairing the Hard Drive and Permissions
    Boot from your OS X Installer disc. After the installer loads select your language and click on the Continue button. When the menu bar appears select Disk Utility from the Installer menu (Utilities menu for Tiger, Leopard or Snow Leopard.) After DU loads select your hard drive entry (mfgr.'s ID and drive size) from the the left side list. In the DU status area you will see an entry for the S.M.A.R.T. status of the hard drive. If it does not say "Verified" then the hard drive is failing or failed. (SMART status is not reported on external Firewire or USB drives.) If the drive is "Verified" then select your OS X volume from the list on the left (sub-entry below the drive entry,) click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior and/or Tech Tool Pro to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.
    2. Do not proceed with an Archive and Install if DU reports errors it cannot fix. In that case use Disk Warrior and/or TechTool Pro to repair the hard drive. If neither can repair the drive, then you will have to erase the drive and reinstall from scratch.
    3. Boot from your OS X Installer disc. After the installer loads select your language and click on the Continue button. When you reach the screen to select a destination drive click once on the destination drive then click on the Option button. Select the Archive and Install option. You have an option to preserve users and network preferences. Only select this option if you are sure you have no corrupted files in your user accounts. Otherwise leave this option unchecked. Click on the OK button and continue with the OS X Installation.
    4. Upon completion of the Archive and Install you will have a Previous System Folder in the root directory. You should retain the PSF until you are sure you do not need to manually transfer any items from the PSF to your newly installed system.
    5. After moving any items you want to keep from the PSF you should delete it. You can back it up if you prefer, but you must delete it from the hard drive.
    6. You can now download a Combo Updater directly from Apple's download site to update your new system to the desired version as well as install any security or other updates. You can also do this using Software Update.

  • I'm Back! Need some Advice! Rebuild time! 6/19 UPDATE! 2nd UPDATE 7/6/15

    WooHooooooo! Another quick update, only 5 minutes ago I found this link on credit karma http://www.creditonecards.com/pre-qualification.php?C1BSourceID=C1B1  that lets you prequalify for a credit card! Which I have tried many many many times  only to recieve the message sorry we couldn't prequalify you at this time but here are some SECURED cards you may like which sucks! I decided to try one more time at this link and was totally surprised to get preapproval for a platinum card yay! Mind you, this card is probably the worst card to get and I will probably never ever use it, just need it to help with my utilization scores. The fees are high, the rates are high, the balance is low........but oh well I am still doing the happy dance!!!

    izzesparks wrote:
    Hi everyone! Long time no see! Just need some advice on what else I should be doing. I have been a part of this forum for many years now and I have taken and heeded so much advice that my head is about to explode and now I just want to make sure I am not forgetting anything. I tried to keep it short  Last time I was on I hadn’t reached the 600 club yet. But I am here now in the 600 club! Still the low 600’s but its progress. Unfortunately slow progress because a lot has happened since I was last on here. I am now officially divorced. I finally have permanent steady income, no temp services anymore phew. I have had to reevaluate my budget and cut a lot of things out. No cable, no home phone, monitor my electric bill like a hawk and learn to like the darkness, cold in the winter and the heat in the summer. I have an older smart phone, had to do without the latest gadgets and gizmos, which truly hurts my heart because I am an electronic fiend. No tablets here, no high tech laptops. Instead of buying a new car and making payments I bought a really good used gas-efficient car cash, paid in full. But since it’s still a newer car I am paying for full coverage insurance, my only splurge. I have spent this time away from this forum truly taking heed to the lessons I learned on here and reflecting on my situation. I have paid nearly everything off! It took some time but I only have 2 creditors left ‘that I know of’ to pay.One of the creditors has not reported to the bureaus yet but I want to take care of them before they do. Most of the ones I paid have already fallen off because of SOL. I was getting to the point I had the problem where I didn’t just have bad credit, I had NO credit. I hadn’t opened any new accounts until this year. Just today I opened a $500 Secured Personal loan and a few months ago I opened a $300 Secured Credit Card at my credit union. I also applied for a Quicksilver CapOne card and was approved for $300. I just started school this year and there is now a financial aid loan of $1750 that is reporting on my credit report as deferred right now. I tried to prequal for some more but was denied by all of them. So far only quicksilver would approve me.  My plans are to move out of state next May and get an apartment for 6 months while I get the lay of the land and then purchase my FIRST home!! Hopefully everything has aged by then and I have had some CLI’s.  My situation in a nutshell (Transunion was only report pulled) USED CREDITCHECKTOTAL TO PULL ALL 3 FICO REPORTS The good:UPDATES BELOW FROM 7/6/15SDFCU Visa Secured $300 – reporting paid on time every timeQuicksilver Unsecured $300 – not reporting yetSecured Personal Loan $500- not reporting yetUtility- reporting paid on time every timeNEW CARDS ADDED-Cap One Platinum MC Unsecured-not reporting yetVictoria Secret-not reporting yetMarisota-not reporting yetSent a Goodwill email for the Portfolio account listed below 6/1/15, now must wait patiently. UPDATE!! 7/6/15 SENT 3 GOODWILL LETTERS NO RESPONSE. The bad:                                                                                                                                                                                                     DEBT RECOVERY SOLUTIONS- I PAID IN FULL ON 5/27/15 Haven't found a good email contact to send a GW letter, but the search continues....Original Creditor11 VERIZON MARYLAND INCStatus-OpenOpened Date-Mar 06, 2014Balance -$146 Collection Agency-FCOOriginal Creditor HERITAGE WOODSStatus -OpenOpened Date -Jan 21, 2011Responsibility – Joint (THIS IS IN BOTH MY NAME AND MY EX-HUSBAND, AND HE SAYS HE WILL HELP PAY, BUT HE IS NOT GREAT AT FOLLOW THRU)Balance- $1,912 (They have agreed to settle for less than owed for $978)    STARTED PAYMENTS, ASKED SEVERAL TIMES FOR A PFD, EVEN ASKED A SUPERVISOR AND THE RESPONSE WAS A BIG FAT NO, SO I AM GOING TO GO THE GOODWILL ROUTE. Collection AgencyPORTFOLIO Recovery (I ALREADY PAID A SETTLEMENT FOR LESS THAN OWED, ON 5/27/15)Original Creditor HSBC BANK SENT GW LETTER, NO RESPONSEStatus -OpenOpened Date-Apr 15, 2013Balance -$518 Collection AgencyRECEIVABLE SOLUTION (PAID IN FULL ON 5/27/15) THEY HAVE AGREED TO DELETE YAY!Original Creditor MED1 AMERICAN CURRENT CAREStatus OpenOpened Date Jul 25, 2013Balance $101 Collection AgencyUNITED CONSUMERS (PAID IN FULL ON 5/27/15) THEY HAVE ALREADY DELETED FROM ALL 3 CRA'S YAY!Original Creditor MED1 EMERGENCY PHYSICStatus OpenOpened Date Oct 06, 2011Balance -$109 ACS/JP MORGAN (PAID IN FULL ON 2/25/15) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $3000 ACS/JP MORGAN (PAID IN FULL ON 2/25/15) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $800 ECMC (TRANSFERRED TO ACS/JP MORGAN) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $800 ECMC (TRANSFERRED TO ACS/JP MORGAN) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $3000 A new account was added to my credit report Trident asset - original creditor - Lowe's home improvementI disputed the account since I do not remember ever shopping there, claims I wrote a bad check. I don't even have a checkbook, never have. A new creditor sending letters to me now (boy they sure are coming out of the woodworks, not that I have started paying everyone off) NOT reporting to CRA's yet, going to try to take care of this next week before it does. Sooooooooooo what should I do know????!!!! Thanks in advance for any advice given! 

  • Business Delegate pattern - need some advice

    Hi. First let me apologize for the long post. I could see no other way. I�m building a system that quite large and I need some advice. The system is a type of transaction system, let�s suppose a shopping cart. I�m using struts taglibs and tiles for presentation, struts proper for controller, and POJOs for business logic. Also I�m using OJB for my data tier.
    Now I�ve been reading Pro Jakarta Struts (Apress), which BTW is a recommended read to anyone with novice experience in struts and related technologies. I�ve assimilated most of the techniques and patterns described in the book, and most of them make sense to me. However, I�ve hit a snag while reading the Business Delegate and Service Locator patterns.
    The way I had though of building my application before reading the book, was to have a wrapper class, such as the following:
    public class ShoppingCart {
      private IAuthenticationService authenticationService;
      private ITransactionService transactionService;
      public ShoppingCart() {
         authenticationService = new DBAuthenticationService();
         authenticationService = new DBTransactionService();
      public login(String username, String password) {
         String sessionToken = authenticationService.logon(username, password);
         return sessionToken;
      private boolean isValidUser(sessionToken) {
         bolean validUser =  authenticationService.isValidUser(sessionToken);
         return validUser;
      public performTransaction(sessionToken, TransactionVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         transcationService.performTransaction(TransactionVO);
      public editPreferences(sessionToken, PreferencesVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         authenticationService.performTransaction(PreferencesVO);
    }My idea was that my wrapper class would isolate all the business logic and could perform login service in case my application was ever to be used with other presentation layer than struts (standalone client, web services). However I believe that this overlaps the Business Delegate pattern and maybe even totally implements it. The way I understand the code I�m reading in the book, they suggest having a BD for each major service such as AuthenticationServiceBD, TransactionServiceBD, etc� However this would break my single point of entry for authenticating users. I really need some advice on my design and how it fits with the BD and SL patterns (or others). I would also like to know what you think/recommend of my authentication strategy.
    thanks in advance
    Raphael

    Thanks for your reply. This however, I understood. My concern is regarding my application in regards to business delegate pattern. You see I have this class (simplified for clarity):
    public class ShoppingCart {
       private ILoginService ls = new DBLoginService();
       private ITransactionService ts = new DBTransService();
       // and so on for all services I offer.
       //  then I mirror all the calls of my private interfaces
       //  and pass them through internally
       public String sessionToken login(String username, String password) {
            ls.login(username, password);
       public boolean addToCart(sessionToken, itemNo) {
            // check session
            ts.addToCart(sessionToken, itemNo);
       //  and so on
    }Multiple questions for this one:
    1) Am I not already implementing the Business Delegate pattern with my ShoppingCart class since all interfaces are private and all calls are mirrored from the wrapper class (ShoppingCart) to the private interfaces? All services are implemented as POJOs and I am not using JNDI at the present so I don't use the ServiceLocator pattern.
    2) I store a reference to the wrapper class (ShoppingCart) in the ServletContext so I can grab it from my Action classes. What do you think of this approach?
    3) How many BDs should an application contain. In my case I use just one. What is the advantage of using more?
    4) I create my own session tokens in case I ever want to use to business code in a non-web applications where sessions are not available readily. This brings about the problem that I can't pass the interfaces directly to the Action classes because the login session needs to be checked before any calls to services. So all methods include a sessionToken parameter which I use to check the session. This way, if I want to expose some of the services through web services, I can still use a login. What do you think of this approach.
    5) Any other remarks are very welcome...
    I really need help with this from an experienced programmer. Most things I can handle on my own but with this type of design issue, books just don't cut it. I need experience. I would really apreciate some feedback.
    Raphael
    ps: I would give all my Duke dollars for this (I only have 30), but I'm not sure how. If you want them I can create a dummy question and give them to you.

  • I need some advice about the macbook pro and iPhone 5. I took a video on my iPhone and tried to email it it said it was too big to send? So i downloaded it to my macbook pro and tried to mail it to no avail? The macbook tells me the server won't let it th

    I need some advice about the macbook pro and iPhone 5.
    I took a video on my iPhone and tried to email it it said it was too big to send? So i downloaded it to my macbook pro and tried to mail it to no avail? The macbook tells me the server won't let it through other mail goes through any ideas how to resize it or what it might take to send it?

    I agree with LowLister, the best option for you to share the video online is to upload it to your online storage account for example : Box, Dropbox, SkyDrive (All of them provide free storage beginning from 2GB).
    You can upload the files which you want to share in this online storage and then they have sharing options in which you'll will get the link of the file to be sent and send the email. You're good to go!
    Tip : You can store multiple files for backup purposes.

  • When I burn a disc from a playlist in iTunes, the track names and artist info does not display on the disc when friends view/listen to it. This probably is an easy fix, but I need some advice.

    When I burn a disc from a playlist in iTunes on my MacBook, the track names and artist info does not display on the disc when friends view/listen to it. This probably is an easy fix, but I need some advice.

    No, this standard has been implemented for several decades.
    How iTunes remembers audio CDs - http://support.apple.com/kb/TA27785
    It is just conceivable you burned a CD that exactly matched one already in the Gracenote database.  Gracenote uses track count and duration to decide what CD it is you have in a computer.  If you have one that matches that it will label it.  You could conceivably even have one that matches it that is not the correct one.
    This script will only work on Macs:
    http://dougscripts.com/itunes/scripts/ss.php?sp=cdtexttocdinfo - script to use CD-text file on CD to label CD in iTunes

  • Having some serious issues with my iPhone and need some advice

    I'm going to these two issues which have been occuring with me for the past weeks-
    1.) I am facing a problem with my iPhone 5's lightning port or the cable. This started happening all of a sudden; one second my phone is charging, and the other it is not. Even if it is slightly moved from its position, it would stop charging, and further shaking starts it again, so on and so forth. At first I thought the issue might be with my cable, so I asked my friend to bring his lightning cable to my house so we could test that. It happened again- one shake the phone will charge, another shake stops it. (Note that any kind of movement does this, not only shaking) I'm a bit skeptical about his (my friend's) cable too, though- it shows NOT CHARGING on his iPad while it is in fact actually charging. His cable is only 3-4 weeks old though, so this confuses me even more. I think the issue might be with my port, but as of now I cannot draw a valid conclusion to my problem.
    2.) The second problem is that I've noticed my battery drains a **** lot faster now- ever since the first issue started. I manage to get my phone charging by placing it very carefully on the table and it charges overnight. However, when I pick it up in the morning, and read some news, it drains from 100% to 99% in ~60 seconds. This never happened before. Before this, it used to be at 100% for at least 10-15 minutes (might be even more). If I reboot my phone, it shows 100% again, but it still drains a lot faster now. I know because I've been using this phone for the past 4 months now, and I know when it drains and when it does nots
    Please, help! I need some advice as to how I should approach this problem. My phone is in the warranty period, however, I would like to have an expert's opinion first.

    Hello,
    First: I've experienced the same problem with my iPhone 5. I've bought a new charger and it still did the same thing. I went to the Apple Store to get my iPhone checked out and they said that the pins inside my iPhone we're damaged, and I had to get a replacement.
    ~ Josh

  • I need some advice...

    Hi, I'm not quite sure where this topic should go exactly as it isn't about a specific topic. So plz fogive me if it's wrongly placed in your opinion.
    Anyway, I've been a long time fan of Linux and I don't want to have to stop using it. I've just recently converted my whole computer to a linuxbox only system, as I was running winxp(uke) before and couldn't stand it. It would lag during simple tasks like going from one directory to another and for no apparent reason, which aided me in my conversion. Enough about winblows, I don't need to tell you guys why it sucks, we all have our reasons. But there is just one thing bothering me now... and that is gaming. I am a huge fan of gaming and have been doing so for quite some time now (years) and well... gaming on linux hasn't been too pleasant for obvious reasons.
    1) the games I play except for quake3 are written and made to run solely on a winblows workstation.
    2) Wine and Winex3 have limited, but growing support for a range of games.
    3) Lastly the main game I would like to play (Steam CS 1.6) doesn't like to run on linux due to its constant updates, which throws WInex3 out of wack. Where it could have been working the day before but due to the update it no longer runs.
    I'm thinking of just making a partition for winxp(uke) so that I can game, but this isn't something I'm totally willing to do.
    Basically I need some advice and/or suggestions that anyone is willing to share with me.
    Thank you in advance.
    BTW: I'm not new to linux, I've been using it for almost 2 years now and have tried ALL of the distro's you can think of. (Arch is my distro of choice at the moment, along with slackware.)

    Enemy Territory is an excellent game, and it is totally free.
    I haven't played the free game from the US Army, but heard it is really good, and is totally free.
    I bought Return to Castle Wolfenstein, which plays perfectly in Single player mode, but I have some trouble in multiplayer mode (and I'm not an expert either).
    I bought Unreal Tournament 2004, which plays perfectly in both single player and online, but I simply suck at the game.
    I bought Never Winter Nights because I know the company has a linux version you can download once you have a registered copy.  I havent installed it yet, though, been playing UT2004.
    Doom3 is supposedly going to have a linux installer on the CD's, like UT2004 does.
    Anygame that uses OpenGL graphics instead of DirectX will prolly run under WINE or WINEX, or be easy for the original company to port (if they choose to).
    There are some "up and coming" linux only OpenGL games, light flightgear (a flight simulator), and a couple of 'massive online games".
    Betweet RTCW, EnemyT, Never Winter Nights, UT2004, and soon Doom3 - I have enough games to play, and thats without buying winex.
    Fergettabout Windows! You simply don't need it anymore.
    If you are determined to run Windows, get a removeable drive bay, and just swap boot drives when you want to swtich.  Or use GRUB if you want to select from multiple OS's.
    thx

  • Hi Just got a iMac A1418.21.5 I am looking for some advice on what Final Cut pro would work well with it? many thanks

    Hi Just got a iMac A1418.21.5 I am looking for some advice on what Final Cut Pro  series would work well with this set up ? regards

    How much Ram? Final Cut Pro X is the only version curently developed and is available on the App Store.

Maybe you are looking for

  • Flashack table and partitions??

    Hi All, Can We use the flash back tables with partitions... Any idea or any document about Flash back table and partitions relationship in 11 or 10g would help... Thanks

  • HT1688 lost my contacts what to do

    switched iclouds apple id and new icloud erased contacts

  • Firefox doesn't show smileys on Facebook

    Hi, I need to solve a problem with smileys in Facebook chat. When someone send me smileys, Firefox doesn't show them, but I can see them in other browsers. I opened 'about:crush' and the most recent Report ID's starting with 'bp-' letters are followi

  • Usage of @@ in scripts

    Hi, i thought the command should look for the specified script in the same path or url as the script from which it was called. but .. sqldeveloper-1.1.3.2766-no-jre\sqldeveloper\sqldeveloper\bin\... is not the place to look for. is it a bug or missin

  • Trying to Execute Catalog SSIS Package using Catalog stored proc by a Master SSIS package inside a Loop

    Hi Guys , To Execute Packages deployed in Catalog , I have created a wrapper SP  which internally calls  catalog SP  ( below is the code ) ALTER PROCEDURE [Publish].[usp_ExecutePackages]               @PackageName NVARCHAR(255)         ,      @Projec